openSUSE Security Update : php5 (openSUSE-2016-626)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for php5 fixes the following security issues :

- CVE-2016-4073: A remote attacker could have caused
denial of service, or possibly execute arbitrary code,
due to incorrect handling of string length calculations
in mb_strcut() (bsc#977003)

- CVE-2015-8867: The PHP function
openssl_random_pseudo_bytes() did not return
cryptographically secure random bytes (bsc#977005)

- CVE-2016-4070: The libxml_disable_entity_loader()
setting was shared between threads, which could have
resulted in XML external entity injection and entity
expansion issues (bsc#976997)

- CVE-2015-8866: A remote attacker could have caused
denial of service due to incorrect handling of large
strings in php_raw_url_encode() (bsc#976996)

- CVE-2016-4071: A remote attacker could have caused
denial of service, or possibly execute arbitrary code,
due to incorrect handling of string formatting in
php_snmp_error() (bsc#977000)

This update was imported from the SUSE:SLE-12:Update update project.

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=976996
https://bugzilla.opensuse.org/show_bug.cgi?id=976997
https://bugzilla.opensuse.org/show_bug.cgi?id=977000
https://bugzilla.opensuse.org/show_bug.cgi?id=977003
https://bugzilla.opensuse.org/show_bug.cgi?id=977005

Solution :

Update the affected php5 packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: SuSE Local Security Checks

Nessus Plugin ID: 91290 ()

Bugtraq ID:

CVE ID: CVE-2015-8866
CVE-2015-8867
CVE-2016-4070
CVE-2016-4071
CVE-2016-4073

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now